LGTM to experiment.

I applaud the efforts to specify here what has previously been a UA 
heuristic. Although my first impression was that a spec was not too 
important, because the UA could always pretend there was a network error, 
closer review of the draft reveals that this is not the case: there's a 
number of observable other checks that could happen beforehand, and so this 
is actually observable.

I've 
opened https://github.com/explainers-by-googlers/script-blocking/issues/2 
on some of the details of this factoring.

On Monday, June 16, 2025 at 11:24:42 PM UTC+9 Zainab Rizvi wrote:

> Contact emailsriz...@google.com, mk...@chromium.org
>
> Explainerhttps://github.com/explainers-by-googlers/script-blocking
>
> Specification
> https://github.com/explainers-by-googlers/script-blocking/blob/main/index.bs
>
> Summary
>
> Mitigating API Misuse for Browser Re-Identification, otherwise known as 
> Script Blocking is a feature that will block scripts engaging in known, 
> prevalent techniques for browser re-identification in third-party contexts. 
> These techniques typically involve the misuse of existing browser APIs to 
> extract additional information about the user's browser or device 
> characteristics.
>
> To strike this balance between protection and usability, this proposal 
> focuses on blocking scripts in a third-party context in Incognito mode. 
> This proposal uses a list-based approach, where only domains marked as 
> “Impacted by Script Blocking” on the Masked Domain List (MDL) 
> <https://github.com/GoogleChrome/ip-protection/blob/main/Masked-Domain-List.md>
>  
> in a third-party context will be impacted.
>
> When the feature is enabled, Chrome will check network requests against 
> the blocklist.  This feature will reuse Chromium's subresource_filter 
> component, which is responsible for tagging and filtering subresource 
> requests based on page-level activation signals and a ruleset used to match 
> URLs for filtering. 
>
> Blink componentBlink>Network>FetchAPI 
> <https://issues.chromium.org/issues?q=customfield1222907:%22Blink%3ENetwork%3EFetchAPI%22>
>
> TAG reviewhttps://github.com/w3ctag/design-reviews/issues/1114
>
> TAG review statusPending
>
> Risks
>
>
> Interoperability and Compatibility
>
> There shouldn’t be any interop concerns. In terms of compatibility, this 
> feature is anticipated to have an impact on websites that rely on scripts 
> from domains identified as serving fingerprinting techniques. Sites that 
> integrate third-party scripts from identified domains may experience 
> functional breakage or render incorrectly when accessed in Incognito mode.
>
>
> *Gecko*: Shipped/Shipping (
> https://support.mozilla.org/en-US/kb/trackers-and-scripts-firefox-blocks-enhanced-track
> )
>
> *WebKit*: Shipped/Shipping (
> https://webkit.org/tracking-prevention/#private-browsing-mode)
>
> *Web developers*: No signals
>
> *Other signals*:
>
> WebView application risks
>
> Does this intent deprecate or change behavior of existing APIs, such that 
> it has potentially high risk for Android WebView-based applications?
>
> None
>
>
> Goals for experimentation
>
> We will run a 1% stable experiment for users when in Incognito mode. Our 
> motivation is functional in nature: we would like to better understand the 
> breakage impact on sites, performance impact of checking requests against a 
> blocklist, as well as testing that updates to the MDL, such as domain 
> additions and removals (from changes to Disconnect's source lists or 
> successful appeals) propagate to Chrome clients. 
>
> We will consider site breakage rates (indicated via user reports, 
> aggregated UMA logging) as well as performance metrics (e.g., page load 
> time, memory usage). 
>
> Ongoing technical constraints
>
> None
>
>
> Debuggability
>
> We have added support in DevTools Issues to indicate which requests are 
> being blocked by this feature. We also have 
> chrome://flags/##enable-fingerprinting-protection-blocklist-incognito which 
> developers and users can use for testing suspected breakage.
>
>
> Will this feature be supported on all six Blink platforms (Windows, Mac, 
> Linux, ChromeOS, Android, and Android WebView)?No
>
> We plan to launch this on all Blink platforms except WebView.
>
>
> Is this feature fully tested by web-platform-tests 
> <https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md>
> ?No
>
> We are exploring ways to test this feature via WPT. We want to test the 
> correct integration and ordering of the script blocking mechanism within 
> the Fetch API. 
>
>
> Flag name on about://flagsEnable Fingerprinting Protection Blocklist In 
> Incognito
>
> Finch feature nameEnableFingerprintingProtectionInIncognito
>
> Requires code in //chrome?True
>
> Tracking bughttps://g-issues.chromium.org/issues/411138638
>
> Launch bughttps://launch.corp.google.com/launch/4367306
>
> Estimated milestones
>
> We would like to run the experiment from M137 to M142 inclusive.
>
> Link to entry on the Chrome Platform Status
> https://chromestatus.com/feature/5188989497376768?gate=5165545720381440
>

-- 
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/c95c9405-a30e-4e6e-abd1-dabf70241c37n%40chromium.org.

Reply via email to